The Teneo Group is a leader in commercial network security services, data security, and proactive threat prevention, including mobile, endpoint, cloud, enterprise, and beyond.

rhipe is the Cloud Channel Company. We provide licensing, business development and knowledge services that support services providers, system integrators and software vendors accelerate the adoption of the cloud by end customers such as:

Our Platform is Redefining Training

Traditional approaches to training are no longer effective. Modern training must be practical, impactful, and measurable.

Digital skills are built at the intersection of knowledge, experience, and context. The fundamental building blocks of the training templates in our Library meet teams wherever they are along the cloud maturity curve, imparting the knowledge and experience needed to take them to the next level. Our training platform is intuitive and scalable. Most importantly, all training is easily customizable, which enables organizations to provide context and guidance for teams of any size. Teams leveraging Cloud Academy hit the ground running.

&nbsp Live and On-Demand Webinars With Cloud Academy

&nbsp Latest News From Cloud Academy

QA, the UK’s largest B2B skills provider, today announced it has acquired San Francisco-based Cloud Academy, a leading enterprise technology training platform. Cloud Academy will add QA’s massive catalog of more than 500 certification courses and 1500 instructor-led courses to seamlessly blend classroom learning with its intuitive digital platform.

We're Craftsmen in Cloud and Cyber security, we tailor technology around the current and future needs of businesses, agile to scale when the company grows, and designed with security at the core of the build, with 24/7 cover and monitoring by a ISO27001 and Cyber Essentials Plus certified and verified team bringing trust and peace of mind. We offer hybrid cloud solutions working across AWS, Azure, Google Cloud and offer our own private Cloud bringing the best of breed technologies and software to each client.

Guardicore is an innovator in data center and cloud security focused on delivering more accurate and effective ways to protect critical applications from compromise through unmatched visibility, micro-segmentation and real-time breach detection and response. Developed by the top cyber security experts in their field, Guardicore is changing the way organizations are fighting cyber attacks in their data centers.

&nbsp Contributions to ITSPmagazine

As part of ITSPmagazine’s “Share Your Own Story” initiative, Avishag Daniely, Director of Product Management at Guardicore, shares her story about the intersection of diversity, technology, life, and the challenges and inspirations she encountered along her journey into cybersecurity.

Lacework is the industry’s first solution to bring automation, speed, and scale to cloud security enabling enterprises to safely innovate fast in the cloud. Unlike conventional security tools built for static datacenters, the Lacework solution is designed to self-adapt to the cloud ever-changing configuration and workloads.

The Lacework Cloud Security Platform monitors all components deployed in the cloud: applications, processes, workloads, VMs, containers, machines, users, accounts and more. By ingesting and processing far more data than other solutions, Lacework leaves no space for hackers to hide. Just like DevOps automates code deployment, Lacework automates cloud security, empowering IT to continuously keep cloud environments secure and compliant.

&nbsp Recent Contributions to ITSPmagazine

KRACK, as acronyms go, seemed an appropriate handle for last month’s WiFi security disclosure. After a quarter stuffed with bad security news, a new flaw in one of our most beloved technologies might have a few security pros on the verge of cracking. The showiest security disasters make news, but breaches happen every day to organizations of every type around the world. The attacker perpetrating the next big cybersecurity incident is probably already behind someone’s firewall. And while you should definitely patch your vulnerabilities and maybe even turn off your WiFi (ok, just kidding, no one’s going to turn off the WiFi), that’s not going to be enough. We need to change how we think about cybersecurity.

Coronet is an award-winning, privately-held leader in cloud security. Based in Tel Aviv, CORONET enables organizations to fully secure all BYOD, SaaS and cloud services without any integration or customization, containers or proxies, or other tools that limit users, impact their experience, or inhibit productivity. Requiring zero operator involvement, Coronet’s patented SecureCloud Platform continuously identifies risks and threats to ensure that only trusted users, using trusted devices, connecting through trusted networks to trusted cloud services can access corporate data. Based on those risks, the platform automatically controls applications users can use, activities users can perform, and data they can access.

&nbsp Recent Contributions to ITSPmagazine

When is the last time your company truly thought about the security of your network, devices and data? If this answer isn’t “yesterday” or “today,” then your agency, and the client data it is entrusted with, might be at risk. Dror Liwer, CISO of Coronet, outlines what agencies can do to get serious about cybersecurity.

What are the signs of a breach? Are you catching them all or do you have a false sense of security (yes, pun intended) when it comes to all things cyber within your organization? Sean Martin reaches out to the community of experts to help him identify some ways to spot the signs of a breach that might not be immediately evident.

Attackers have shown their cards and the mid-market represents an extremely valuable alternative to the well-defended enterprise. Coronet founder and CISO Dror Liwer reviews the threat landscape and explains why it’s time for the mid-market to take cybersecurity as seriously as the enterprise, even as financial and operational constraints remain.

Cavirin delivers CyberPosture Intelligence for the Hybrid Cloud by providing real-time risk & cybersecurity posture management, continuous compliance, and by integrating security into DevOps. The Cavirin platform combines automated discovery, infrastructure risk scoring, predictive analytics, and intelligent remediation to help organizations of all sizes leverage the cost savings and agility of the cloud without increasing operational risk or reducing their security posture.

Armed with visibility, Cavirin continuously assesses the security posture of all managed cloud services and workloads to compute a CyberPosture score, a number between 0 and 100. A score of 100 represents the least risk. This paper dives into the importance of a CyberPosture Score.

&nbsp Recent Contributions to ITSPmagazine

Cybercrime is on the rise. The number of data breaches in 2017 was staggering and things are likely to get worse. Employee error, employee manipulation, hacking-as-a-service, and the gap between development and test make things even more challenging. Says Dr. Rao Papolu, it's time to take some time to assess the main threats to your cyber defenses.

&nbsp Webinars and Videos on ITSP.TV

Streaming live before, during and after Black Hat 2018 Las Vegas, this is a curated selection of panels and interviews featuring renowned industry experts. As usual, we are producing this series in partnership with BrightTALK.

Protecting Our Critical Infrastructure Starts with NIST CSF (Webinar)

Joe Kucic, creator of the Verizon Risk Report, and Ken Williams, security leader from Nissan Motor Corporation, provide us with their top ten tips to creating a successful security program and where NIST CSF fits in.

Cavirin is a sponsor of the “Budget and ROI” Experts Corner category

&nbsp Latest News

Cavirin Systems, Inc., the only company providing risk, cybersecurity and compliance management for the enterprise hybrid cloud, today announced support for the Google Cloud Security Command Center (Cloud SCC).

Cavirin today announced that it has appointed industry veteran Jack Kudale as its Chief Operating Officer to help lead the company to the next level of market success in 2018. He joins Cavirin most recently from Lacework, a cloud security startup, where he was CEO.

&nbsp Upcoming Events

Armor exists to protect. Each employee feels our passion, knows the vision and lives the company values. Diversity is key. Everyone on the team learns right away that their role is important to Armor’s success. We volunteer our best every day and go to any length to ensure our customers are protected. There are no short cuts. And “good enough” service is never enough. Simply put, we want customers to rave about their experience with us.

With a background rooted in engineering, computer science, and middleware systems development, Mahesh Rachakonda, CISSP, VP Product & Solution Engineering at CipherCloud, has worked on several complex systems, including those found in hospitality, telecommunications, and even some military installments.

Taking the story beyond his role in the industry to that of CipherCloud’s story—which began back in 2010—Mahesh explains to us that the main company message and goal was all about enabling cloud adoption; something that initially took quite some effort to get organizations and people prepared and ready to trust this new operating environment.

As businesses adopted these cloud technologies, they also began to realize that there was a lot to understand concerning how and where security policies, controls, monitoring, and response were handled. This challenge is exacerbated given the sheer number of cloud environments running countless applications and services—which can vary dramatically depending on the industry and widespread use cases within each.

Listen to this story about Mahesh and CipherCloud. There is something interesting here for everyone — no doubt about it.

ITSPmagazine’s John Dasher chats with Anthony James from CipherCloud during RSA Conference 2018 in San Francisco to discuss how enterprises can take full advantage of cloud resources and technology while maintaining visibility and robust security around their use.

The Societal Impact of GDPR

Pravin Kothari, CEO and President of CipherCloud, and Vamshi Sriperumbudur, VP of Marketing from CipherCloud, chat with ITSPmagazine's Sean Martin, providing a great overview for the pending General Data Protection Regulation (GDPR) coming out of the European Union (EU). The discussion includes the positive impact this regulation will have on the EU citizens, essentially giving them back control over their own privacy -- as well as the impact it will have on business all around the world as they have to enable those controls in the applications and services and related data collection points through which they serve the EU citizens.

&nbsp Contributions to ITSPmagazine

The recent cyberattack on the MyHeritage DNA and genealogy testing company compromised about 92 million user accounts. CipherCloud's Pravin Kothari discusses the rise in consumer DNA testing, the risks of this data being used for exploitation or harm, and the protection that consumers should demand of their most valuable personal information.

Verizon has released its 10th annual Data Breach Investigations Report (DBIR), a comprehensive and multi-faceted look-back on breach trends, threat actor tactics and apparent motivations, based on analysis by the company or one of its 65 partners of 1,935 breach events occurring in 2016. This Experts Corner article examines some of its findings by some of the industry's top experts.

It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.